Scheduled System Maintenance:
On Wednesday, July 29th, IEEE Xplore will undergo scheduled maintenance from 7:00-9:00 AM ET (11:00-13:00 UTC). During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

A Light-Weight Implementation Scheme of the Tree Morphing Protocol for Mobile Multicast Sources

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Christ, O. ; HAW Hamburg, Hamburg ; Schmidt, T.C. ; Wahlisch, M.

Multicast network services advantageously complement multimedia information and communication technologies, as they open up the realm for highly scalable multi- customer applications. Mobile environments providing shared limited bandwidth to a growing number of users will emphasize the need for multicast support even further. The traditional Internet approach of Any Source Multicast (ASM) routing, though, remains hesitant to spread beyond limited, controlled environments. It is widely believed that simpler and more selective mechanisms for group distribution in Source Specific Multicast (SSM) will globally disseminate to many users of multicast infrastructure and services. However, mobility support for Source Specific Multicast is still known to be a major open problem. This paper presents a light-weight, secure implementation of the Tree Morphing protocol on the IPv6 network layer. This distributed routing algorithm allows for a continuous adaptation of multicast shortest path trees to source mobility. The approach introduced here is built upon standardized mobility signaling and includes strong authentication by means of cryptographically generated addresses. It neither requires definition of new protocol elements nor significant changes to the forwarding plane.

Published in:

Software Engineering and Advanced Applications, 2007. 33rd EUROMICRO Conference on

Date of Conference:

28-31 Aug. 2007